Ports Search

Results 15,96115,970 of 17,773 for comment.zh_CN%3A%E6%8E%A7%E5%88%B6%E5%8F%B0.(0.069 seconds)
security/Crypt-Twofish2-1.02 (Score: 1.2461754E-4)
Perl implementation of the Twofish encryption algorithm
This module implements the twofish cipher in a less braindamaged (read: slow and ugly) way than the existing "Crypt::Twofish" module. Although it is "Crypt::CBC" compliant you usually gain nothing by using that module (except generality), since "Crypt::Twofish2" can work in either ECB or CBC mode.
security/chrootuid-1.3 (Score: 1.2461754E-4)
Simple wrapper that combines chroot(8) and su(1) into one program
The chrootuid command combines chroot(8) and su(1) into one program, so that there is no need to have commands such as /usr/bin/su in the restricted environment. Access to the file system is restricted to the newroot subtree and privileges are restricted to those of the newuser account (which must be a known account in the unrestricted environment). See also jail(8)
security/clamassassin-1.2.4 (Score: 1.2461754E-4)
Simple virus filter wrapper for ClamAV
Clamassassin is a simple virus filter wrapper for ClamAV for use in procmail filters and similiar applications. Clamassassin's interface is similiar to that of spamassassin, making it easy to implement for those familiar with that tool. Clamassassin is designed with an emphasis on security, robustness and simplicity.
security/nss-3.27 (Score: 1.2461754E-4)
Libraries to support development of security-enabled applications
Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled server applications. Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards.
security/Digest-MD5-Reverse-1.3 (Score: 1.2461754E-4)
Perl extension that looks for MD5 hashes in several databases
MD5 sums (see RFC 1321 - The MD5 Message-Digest Algorithm) are used as a one-way hash of data. Due to the nature of the formula used, it is impossible to reverse it. This module provides functions to search several online MD5 hashes database and return the results (or return undefined if no match found).
security/Digest-Pearson-PurePerl-1.00 (Score: 1.2461754E-4)
Perl extension for Peter K. Pearson's hash algorithm in pure Perl
Digest::Pearson::PurePerl is an implementation of Peter K. Pearson's hash algorithm presented in "Fast Hashing of Variable Length Text Strings" - ACM 1990. This hashing technique yields good distribution of hashed results for variable length input strings on the range 0-255, and thus, it is well suited for data load balancing. If you prefer a fast implementation, you might want to consider Digest::Pearson instead.
security/Digest-Perl-MD4-1.4 (Score: 1.2461754E-4)
Perl extension for MD4 hash algorithm in pure Perl
This is not C-code interface (like `Digest::MD5') but a Perl-only implementation of MD4 (like `Digest::Perl::MD5'). Because of this, it is slow but avoids platform specific complications. For efficiency you should use `Digest::MD4' instead of this module if it is available.
Passphrases and Passwords as objects for Dancer
Dancer::Plugin::Passphrase manages the hashing of passwords for Dancer apps, allowing developers to follow cryptography best practices without having to become a cryptography expert. It uses the bcrypt algorithm as the default, while also supporting any hashing function provided by Digest.
Passphrases and Passwords as objects for Dancer2
Dancer2::Plugin::Passphrase manages the hashing of passwords for Dancer apps, allowing developers to follow cryptography best practices without having to become a cryptography expert. It uses the bcrypt algorithm as the default, while also supporting any hashing function provided by Digest.
security/Digest-DMAC-1.1.4 (Score: 1.2461754E-4)
Perl5 interface to DMAC Double Message-Digest Algorithms
This is Encrypted MAC (EMAC), formerly known as Double MAC (DMAC). Unlike HMAC, which reuses an existing one-way hash function, such as MD5, SHA-1 or RIPEMD-160, EMAC reuses an existing block cipher to produce a secure message authentication code (MAC). Using the block cipher, a message is encrypted in CBC mode. The last block is taken as the MAC of the message. For fixed-length messages, this method is provably secure. In reality, however, messages have arbitrary lengths, and this method is not secure. To make secure MACs for variable length messages, the last block is encrypted once again with a different key. The security of this construction has been proved in the paper, ``CBC MAC for Real-Time Data Sources'' by Erez Petrank and Charles Rackoff. The security can be proved on the assumption that the underlying block cipher is pseudo-random. The performance and key-agility of EMAC are reasonable. EMAC is preferable for short messages because the block length is smaller compared to the schemes based on a hash function. EMAC is also chosen as one of the NESSIE winners for Message Authentication Codes, along with UMAC, TTMAC and HMAC. The current NESSIE specification chooses the AES as block cipher.